By open domain CASE tools we mean
1.tools available in open domain
2.software packages which can be downloaded form the internet
3.software packages to aid each phase of the systems analysis and design which can be downloaded free of cost from the internet
4.source codes of CASE tools
By symmetric key encryption we mean
1.one private key is used for both encryption and decryption
2.private and public key used are symmetric
3.only public keys are used for encryption
4.only symmetric key is used for encryption
Certification of Digital signature by an independent authority is needed because
1.it is safe
2.it gives confidence to a business
3.the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership
4.private key claimed by a sender may not be actually his
EDI over internet uses
1.MIME to attach EDI forms to e-mail messages
2.FTP to send business forms
3.HTTP to send business forms
4.SGML to send business forms
EDI standard
1.is not easily available
2.defines several hundred transaction sets for various business forms
3.is not popular
4.defines only a transmission protocol
EDI standards are
1.not universally available
2.essential for B2B commerce
3.not required for B2B commerce
4.still being evolved
EDIFACT is a standard
1.for representing business forms used in e-Commerce
2.for e-mail transaction for e-Commerce
3.for ftp in e-Commerce
4.protocol used in e-Commerce
For secure EDI transmission on internet/p>
1.MIME is used
2.S/MIME is used
3.PGP is used
4.TCP/IP is used
In cheque payment protocol, the purchase order form is signed by purchaser using
1.his public key
2.his private key
3.is private key using his signature hardware
4.various public keys
In electronic cheque payments developed, it is assumed that most of the transactions will be
1.customers to customers
2.customers to business
3.business to business
4.banks to banks
In public key encryption system if A encrypts a message using his private key and sends it to B
1.if B knows it is from A he can decrypt it using A's public key
2.Even if B knows who sent the message it cannot be decrypted
3.It cannot be decrypted at all as no one knows A's private key
4.A should send his public key with the message
In SET protocol a customer encrypts credit card number using
1.his private key
2.bank's public key
3.bank's private key
4.merchant's public key
Main function of proxy application gateway firewall is
1.to allow corporate users to use efficiently all internet services
2.to allow intranet users to securely use specified internet services
3.to allow corporate users to use all internet services
4.to prevent corporate users from using internet services
Open domain CASE tools
1.are available for almost all phases of system analysis and design life cycle
2.are available only for drawing DFD's
3.are no available to document SRS
4.creating data dictionaries
Public key system is useful because
1.it uses two keys
2.there is no key distribution problem as public key can be kept in a commonly accessible database
3.private key can be kept secret
4.it is a symmetric key system
The acronym DES stands for
1.Digital Evaluation System
2.Digital Encryption Standard
3.Digital Encryption System
4.Double Encryption Standard
The expansion of CASE tools is:
1.Computer Assisted Self Evaluation
2.Computer Aided Software Engineering
3.Computer Aided Software Environment
4.Core Aids for Software Engineering
The following ciphertext was received. The plaintext was permuted using permutation (34152) and substitution. Substitute character by character ±3 (A → D, etc). The plain text after decryption is: Cipher text : PDLJDLXHVQC
1.MAIGAIUESNZ
2.IAMAGENIUSZ
3.LDPDJHPLXVZ
4.IAMAGENIUSC
The responsibility of a certification authority for digital signature is to authenticate the
1.hash function used
2.private keys of subscribers
3.public keys of subscribers
4.key used in DES
Triple DES uses
1.168 bit keys on 64-bit blocks of plain text
2.Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.
3.Works with 144 bit blocks of plain text and applies DES algorithm once.
4.Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice.